The Suspicious Activity Process: How to Identify, Monitor, and Report Suspicious Activity, to include How to Write a Good Suspicious Activity Report
Thomas E Nollner has more than 40 years of experience in AML/CFT financial institution supervision and consulting. Mr. Nollner spent 30 years as a National Bank Examiner for the Comptroller of the Currency where he was a safety and soundness examiner and a compliance examiner. As a safety and soundness examiner, he examined national banks for capital adequacy, asset quality, management issues, earnings concerns, and liquidity funding. As a compliance examiner, his specialty was as an AML/CFT examiner, where he analyzed AML/CFT programs to ensure that these programs fully complied with applicable banking laws, rules, and regulations; he reviewed suspicious transactions identification, monitoring, and reporting process; he traced proceeds and transactions through several layers of activity; and, he reviewed AML/CFT processes and procedures to determine root causes of AML/CFT program weaknesses.
Mr. Nollner currently works as a banking consultant for several large international consulting firms, he has functioned as an expert witness in several AML/CFT cases, and he is employed by the Office of Technical Assistance (OTA), a branch of the U S Treasury that assists developing countries with banking issues. Working for the OTA, Mr. Nollner is assigned to the Economic Crimes Team focusing on training, assisting, and mentoring the staff of the financial regulatory departments and financial intelligence units of various countries regarding AML/CFT compliance. In this capacity, Thomas works in developing countries such as Afghanistan, Iraq, Kosvo, Paraguay, Liberia, and Viet Nam developing AML/CFT examination procedures, providing AML/CFT training and mentoring, and updating local AML/CFT laws and regulations.
Every day in your branch situations occur which are considered "suspicious" and may even put your employees and customers into what we will call a "felony moment." If your customer asks "Should I deposit this money?" The answer your officer gives may encourage the customer to structure, and that is a problem for both the customer and the employee. This program will answer commonly asked frontline questions and it will go over the red flags for money laundering for deposits and loans. You won't want to miss this fun frontline approach to red flags and your anti-money laundering program.
This webinar will help participants grow their career by providing them with information, skills, and knowledge related to the suspicious activity process, it will help participants become aware of problems and issues related to identifying, monitoring, and reporting suspicious activity, and it will help the participants understand the effects a poor or weak suspicious activity program can have on an institution. By obtaining and utilizing these skills, participants will become valuable members of their organization and help their organization remain compliant with suspicious activity laws, regulations, and guidelines.
- How can I talk to my customer about currency transactions without getting into a "felony moment"?
- The money smells like marijuana. Is this something I should be concerned about?
- The customer told me that she is hiding money from the IRS, should I tell BSA?
- What are the Red Flags for Elder Abuse?
- What are some of the scams for loans and mortgages?
- What are the Red Flags for Identity Theft?
- When do we tell the BSA officer, and what should we use to communicate?
- Sample Incident reports for operations, loans, and branches
- The customer washed and ironed the money. Is this suspicious?
- The customer had me count $15,000 cash and then went to the safe deposit box, should I let BSA know?
- We did not book the mortgage loan so why should I tell BSA that the identification and TIN did not match?
Who Should Attend
- Front line BSA/AML staff
- Account opening staff
- Risk managers
- BSA/AML Officers
- Compliance Officers
- BSA/AML Audit staff
Why Should You Attend
- Why identifying suspicious activity is so important
- How to identify suspicious activity
- How to monitor suspicious activity
- How to report suspicious activity
- How suspicious activity reports are used by law enforcement